Browse Definitions :
Definition

Universal Business Language (UBL)

Universal Business Language (UBL) is a royalty-free set of documents based on the ebXML (Electronic Business XML) Core Components Technical Specification, also known as ISO 15000-5. UBL is overseen by OASIS (Organization for the Advancement of Structured Information Standards), a worldwide consortium devoted to the establishment of open IT (information technology) standards. The UBL project was originally conceived in 1999 and the first version was released in 2004.

The primary purpose of UBL is to promote and support the global use of e-commerce documents that conform to widely accepted industry criteria and government regulations, independent of local and regional infrastructure s. UBL is intended to work effectively among multiple domains and SOAs (service-oriented architectures). UBL is designed for ease of adoption and use. It is directly applicable to most existing records and archives, offering an affordable and relatively simple way for small and medium-sized businesses to enter and compete in the international e-commerce community.

This was last updated in September 2007

Continue Reading About Universal Business Language (UBL)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close